✅ Перевірена відповідь на це питання доступна нижче. Наші рішення, перевірені спільнотою, допомагають краще зрозуміти матеріал.
A security engineer notices that an employee is bypassing an access control system by exploiting a weakness in modular arithmetic calculations. The system verifies passwords by checking whether H(P)≡K mod 101, where H(P) is a hash of the password and K is a stored value. The engineer suspects that the employee is leveraging a property of numbers to derive passwords quickly.
What is the most likely vulnerability being exploited?
a) Small prime modulus makes it easy to compute modular inverses. b) Fermat’s theorem can be used to derive the hash function’s properties. c) The modulus is prime, allowing easy calculation of discrete logarithms. d) The system is using a weak form of modular exponentiation that leaks information.